US20100074118A1 - System and method for detecting a network failure - Google Patents

System and method for detecting a network failure Download PDF

Info

Publication number
US20100074118A1
US20100074118A1 US12/233,724 US23372408A US2010074118A1 US 20100074118 A1 US20100074118 A1 US 20100074118A1 US 23372408 A US23372408 A US 23372408A US 2010074118 A1 US2010074118 A1 US 2010074118A1
Authority
US
United States
Prior art keywords
inquiry process
communication path
recipient
sender
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/233,724
Other versions
US7983175B2 (en
Inventor
Martin J. Gale
Clare Owens
Peter Johnson
Jason Edmeades
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/233,724 priority Critical patent/US7983175B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OWENS, CLARE, EDMEADES, JASON, GALE, MARTIN J., JOHNSON, PETER
Publication of US20100074118A1 publication Critical patent/US20100074118A1/en
Application granted granted Critical
Publication of US7983175B2 publication Critical patent/US7983175B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Definitions

  • the embodiments of the invention generally relate to identifying failures within a communications network and more particularly to systems and methods that search for failures from both the sender side and the recipient side and that identify possible failed nodes before reporting the communications failure, so that both the failure and the possible source of the failure can be reported together.
  • connection between two parties can fail for some reason unknown to either of the parties.
  • loss of connectivity often means the business ceases to function as it should with the resulting loss of revenue as a result.
  • problem determination can be hard to focus, particularly if the connection is formed by a route over a number of hops, for example a LAN in a data centre, a public WAN such as the Internet, and so on.
  • the embodiments described below help narrow the failure possibilities to help better identify the broken point in the connection.
  • one method embodiment (which can be controlled and/or operated by a third party) herein detects a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over a communication path.
  • the communication path is formed of a plurality of nodes of at least one computerized network.
  • the method Upon detection of the failed communication, the method initiates a first inquiry process from the sender. This first inquiry process tests how far a first test communication transmission can travel from the sender to the recipient along the communication path. Similarly, upon detection of the failed communication, the method initiates a second inquiry process from the recipient. The second inquiry process tests how far a second test communication transmission can travel from the recipient to the sender along the communication path. Thus, the first inquiry process and the second inquiry process send (potentially simultaneously) the test messages from opposite ends of the communication path.
  • the method sends instructions to the sender and the recipient over a second communication path that is different than the first communication path.
  • the method combines the results of the first inquiry process and the results of the second inquiry process to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node.
  • the identification of the possibly faulty node is then output to the third party, the sender and/or the recipient.
  • This process of using the results of the first and second inquiry processes involves identifying at least one of the nodes positioned between a first farthest limit and a second farthest limit.
  • the first farthest limit is the farthest location along the communication path from the sender where a first test communication transmission traveled.
  • the second farthest limit is the farthest location along the communication path from the recipient where a second test communication transmission traveled as the possibly faulty node.
  • the results of the first and second inquiry processes can be sent to a third party that is different than the sender and the recipient. This third party would then perform the process of using the results to identify the possibly faulty node.
  • the method can also output an identification of the failed communication transmission to the sender and the recipient. Therefore, the embodiments herein do not just report that a communication transmission has failed, but also simultaneously report the possibly faulty node or nodes that are likely responsible.
  • One system embodiment comprises a monitor that can be positioned in the sender or the recipient (or positioned external to both) and that is operatively connected to the communication path.
  • the monitor detects the failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over the communication path. Also, the monitor sends instructions to the first tester and the second tester over a second communication path (that is different than the first communication path) to initiate the first inquiry process and the second inquiry process. Again, the first inquiry process and the second inquiry process send test messages (test communication transmissions) from opposite ends of the communication path.
  • the system includes a first tester that is operatively connected to the monitor and is in communication with or positioned within the sender.
  • the first tester initiates the first inquiry process from the sender upon the detection of the failed communication. Again, the first inquiry process tests how far the first test communication transmission can travel from the sender along the communication path.
  • the system includes a second tester that is operatively connected to the monitor and is in communication with or positioned within the recipient.
  • the second tester initiates the second inquiry process from the recipient upon the detection of the failed communication. Again, the second inquiry process tests how far the second test communication transmission can travel from the recipient along the communication path.
  • the system further includes a processor that is operatively connected to the first tester and the second tester.
  • the processor can be within the first tester, the second tester or can be a third party separate from both.
  • the first and second testers respectively output the results of the first and second inquiry processes to the processor.
  • the processor combines the results of the first and second inquiry processes to determine which of the nodes in the communication path are not successfully forwarding test communications so as to identify the one or more possibly faulty nodes.
  • the processor combines the results by identifying the node or nodes positioned between the first farthest limit along the communication path from the sender where the first test communication transmission traveled and the second farthest limit along the communication path from the recipient where the second test communication transmission traveled as the possibly faulty node.
  • the processor outputs the identification of the possibly faulty node (potentially from the third party) to the sender and the recipient.
  • the processor can output, simultaneous with the outputting of the identification of the possibly faulty node, an identification of the failed communication transmission to the sender and the recipient.
  • FIG. 1 is a flow diagram illustrating a method embodiment of the invention
  • FIG. 2 is a schematic diagram of a communication network embodiment of the invention.
  • FIG. 3 is a schematic diagram of a system embodiment of the invention.
  • embodiments herein search for failures from both the sender side and the recipient side. Further, embodiments herein identify possible failed nodes before reporting the communications failure so that both the failure and the possible source of the failure can be reported together.
  • the embodiments herein e.g., using a Socket on JavaTM
  • issue a diagnostic call e.g. to Ping®, Traceroute®, Pathchar®, and Tulip® or similar applications, discussed below
  • Traceroute® is able to show the route between two points and establish connections with each hop, returning a code to indicate success (or otherwise, with a reason) upon reaching that hop.
  • one embodiment herein begins by detecting a failed communication transmission in item 100 .
  • All the steps herein can be controlled, operated, and/or performed by a third party that is separate from the sender and the recipient.
  • the third party can own and/or control software used by the sender and recipient to perform the process described below such that, in effect, the third party is performing all the steps of the method described below.
  • a failed communication transmission can occur when a recipient does not receive an expected or requested item after a specific time period has timed-out, or when a sender does not receive a confirmation that a sent item has been received by the recipient after a specific time period has timed-out.
  • the method Upon detection of the failed communication, the method initiates a first inquiry process from the sender in item 102 .
  • This first inquiry process 102 tests how far a first test communication transmission can travel from the sender to the recipient along the communication path.
  • the method upon detection of the failed communication, the method initiates a second inquiry process from the recipient in item 104 .
  • the second inquiry process 104 tests how far a second test communication transmission can travel from the recipient to the sender along the communication path.
  • the first inquiry process 102 and the second inquiry process 104 send (potentially simultaneously) the test messages from opposite ends of the communication path.
  • the method combines the results of the first inquiry process 102 and the results of the second inquiry process 104 in item 106 to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node, shown as item 108 .
  • the identification of the possibly faulty node is then output to the sender and the recipient in item 110 .
  • the method can also output an identification of the failed communication transmission to the sender 200 and the recipient 202 . Therefore, the embodiments herein do not just report that a communication transmission has failed, but also simultaneously report the possibly faulty node or nodes that are likely responsible.
  • FIGS. 2 and 3 An exemplary communication system is shown in FIGS. 2 and 3 .
  • This system includes a sender 200 , a recipient 202 , and a computerized communications network of nodes 204 - 214 between the sender 200 and recipient 202 .
  • the “failed communication transmission” that is detected in item 100 is one that fails to reach the recipient 202 after attempting to be transmitted from the sender 200 to the recipient 202 over a specific communication path, such as nodes 204 , 206 , 211 , and 214 .
  • the method sends instructions to the sender 200 and the recipient 202 over a second communication path (e.g., 204 , 205 , 210 , and 213 ) that is different than the first communication path ( 204 , 206 , 211 , and 214 ).
  • a second communication path e.g., 204 , 205 , 210 , and 213
  • the first communication path 204 , 206 , 211 , and 214.
  • a monitor 230 can be positioned in the sender 200 or the recipient 202 (or positioned external to both) and is operatively connected to the communication path. As shown in FIG. 2 , there can be multiple monitors 230 , or there can be just a single monitor 230 .
  • the sender 200 can include a first tester 232 and the recipient 202 can include a second tester 234 .
  • the first tester 232 is operatively connected to the monitor 230 and is in communication with or positioned within the sender 200 .
  • the second tester 234 is operatively connected to the monitor 230 and is in communication with or positioned within the recipient 202 .
  • the monitor 230 detects the failed communication transmission that fails to reach the recipient 202 after attempting to be transmitted from the sender 200 to the recipient 202 over the communication path. As mentioned above, the monitor 230 sends instructions to the first tester 232 and the second tester 234 over the second communication path (e.g., 204 , 205 , 210 , and 213 ) that is different than the first communication path (e.g., 204 , 206 , 211 , and 214 ) to initiate the first inquiry process 102 and the second inquiry process 104 .
  • the first inquiry process 102 and the second inquiry process 104 respectively use the first tester 232 and the second tester 234 to send the test messages from opposite ends of the first communication path.
  • the first tester 232 initiates the first inquiry process 102 from the sender 200 upon the detection of the failed communication from the monitor 230 .
  • the first inquiry 102 process tests how far the first test communication transmission can travel from the sender 200 to the recipient 202 along the first communication path (e.g., 204 , 206 , 211 , and 214 ).
  • the second tester 234 initiates the second inquiry process from the recipient 202 upon the detection of the failed communication from the monitor 230 .
  • the second inquiry process tests how far the second test communication transmission can travel from the recipient 202 to the sender 200 along the first communication path.
  • the system further includes a processor that is operatively connected to the first tester 232 and the second tester 234 .
  • FIG. 3 illustrates an exemplary system that could be included within the sender 200 , the recipient 202 , the monitor 230 , the third party 220 , any of the nodes 204 - 214 , etc.
  • the system in FIG. 3 comprises a hardware configuration of an information handling/computer system in accordance with the embodiments of the invention.
  • the system shown in FIG. 3 comprises at least one processor or central processing unit (CPU) 10 .
  • the CPUs 10 are interconnected via system bus 12 to various devices such as a random access memory (RAM) 14 , read-only memory (ROM) 16 , and an input/output (I/O) adapter 18 .
  • RAM random access memory
  • ROM read-only memory
  • I/O input/output
  • the I/O adapter 18 can connect to peripheral devices, such as disk units 11 and tape drives 13 , or other program storage devices (computer readable media) that are readable by the system.
  • the processors 10 can read the inventive instructions on the program storage devices 11 , 13 and follow these instructions to execute the methodology of the embodiments of the invention, such as those shown in FIG. 1 .
  • the system shown in FIG. 3 further includes a user interface adapter 19 that connects a keyboard 15 , mouse 17 , speaker 24 , microphone 22 , and/or other user interface devices such as a touch screen device (not shown) to the bus 12 to gather user input.
  • a communication adapter 20 connects the bus 12 to a data processing network 25
  • a display adapter 21 connects the bus 12 to a display device 23 which may be embodied as an output device such as a monitor, printer, or transmitter, for example.
  • the process of using the results of the first and second inquiry processes in item 106 involves identifying at least one of the nodes 204 - 214 positioned between a first farthest limit and a second farthest limit.
  • the first farthest limit is the farthest location along the first communication path from the sender 200 where the first test communication transmission traveled.
  • the second farthest limit is the farthest location along the first communication path from the recipient 202 where the second test communication transmission traveled as the possibly faulty node.
  • the first farthest limit would be node 204 .
  • the second inquiry process 104 was only able to get a test communication to travel from the recipient 202 to node 211 .
  • the second farthest limit would be node 211 .
  • both could reach node 204 , indicating that node 204 was the possibly faulty node.
  • the results of the first and second inquiry processes can be sent to a third party 220 that is different than the sender 200 and the recipient 202 .
  • This third party 220 would then perform the process of using the results to identify the possibly faulty node.
  • the processor 10 can be within the first tester 232 , the second tester 234 , the third party 220 , etc.
  • the first and second testers 232 , 234 respectively output the results of the first and second inquiry processes to the processor 10 .
  • the processor 10 combines the results of the first and second inquiry processes to determine which of the nodes in the communication path are not successfully forwarding test communications so as to identify the one or more possibly faulty nodes.
  • the processor 10 combines the results by identifying the node or nodes positioned between the first farthest limit along the communication path from the sender 200 where the first test communication transmission traveled and the second farthest limit along the communication path from the recipient 202 where the second test communication transmission traveled as the possibly faulty node.
  • the first farthest limit would be node 204 .
  • the second inquiry process 104 was only able to get a test communication to travel from the recipient 202 to node 211 .
  • the processor 10 outputs the identification of the possibly faulty node to the sender 200 and the recipient 202 .
  • the processor 10 can output, simultaneous with the outputting of the identification of the possibly faulty node, an identification of the failed communication transmission to the sender 200 and the recipient 202 .
  • the testers 232 , 234 can use any systems that are appropriate for a given network. Such systems are well-known to those ordinarily skilled in the art and are not discussed in detail herein.
  • U.S. Patent Publication 2008/0049634 (the complete disclosure of which is incorporated herein by reference) uses Traceroute® to analyze real-time data transmissions across a network.
  • U.S. Patent Publication 2007/0177524 (the complete disclosure of which is incorporated herein by reference) based on analysis of TCP path information and/or send/receive packet counts, loss of certain network connectivity can be inferred.
  • Patent Publication 2006/0203739 (the complete disclosure of which is incorporated herein by reference) mentions that tools users employ to investigate network problems include Ping®, Traceroute®, Pathchar®, and Tulip®, discussed below, and that such tools typically trace the paths taken by packets to a destination.
  • Ping® Packet Internet Grouper
  • Ping® is a computer network tool used to test whether a particular host is reachable across an IP network and was written by Mike Muuss in December, 1983 and is currently available at ftp.arl.army.mil/pub/ping.shar. Traceroute® was written by Van Jacobson in 1987 from a suggestion by Steve Deering, with suggestions or fixes from C. Philip Wood, Tim Seaver and Ken Adelman and is currently available at ftp://ftp.ee.lbl.gov/traceroute.tar.gz.
  • Pathchar® is a tool written by Van Jacobson of LBL's Network Research Group and is available at ftp://ftp.ee.lbl.gov/pathchar.
  • Tulip® is a JavaTM application developed by the MAGGIE-NS team from the National University of Sciences and Technology (NUST) Institute of Information Technology (NIIT) and the Stanford Linear Accelerator Center (SLAC) Internet End-to-end Performance Monitoring (IEPM) project in Palo Alto, Calif., USA and information on Tulip® can be found at www.slac.stanford.edu/comp/net/wan-mon/tulip/.
  • both ends of the connection perform testing when the network problem is spotted.
  • the point of probable failure can be narrowed when the two route reports are compared side by side.
  • both affected sites can transmit their information to the third party, to allow an automated determination of the point of failure.
  • embodiments herein search for failures from both the sender side and the recipient side. Further, embodiments herein identify possible failed nodes before reporting the communications failure so that both the failure and the possible source of the failure can be reported together.

Abstract

A method and system detect a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over a communication path. Upon detection of the failed communication, the method initiates a first inquiry process from the sender. This first inquiry process tests how far a first test communication transmission can travel from the sender to the recipient along the communication path. Similarly, upon detection of the failed communication, the method initiates a second inquiry process from the recipient. The second inquiry process tests how far a second test communication transmission can travel from the recipient to the sender along the communication path. The method combines the results of the first inquiry process and the results of the second inquiry process to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node. The identification of the possibly faulty node is then output to the sender and the recipient.

Description

    BACKGROUND
  • 1. Field of the Invention
  • The embodiments of the invention generally relate to identifying failures within a communications network and more particularly to systems and methods that search for failures from both the sender side and the recipient side and that identify possible failed nodes before reporting the communications failure, so that both the failure and the possible source of the failure can be reported together.
  • 2. Description of Related Art
  • Within networked applications the connection between two parties (e.g., a sender and a recipient) can fail for some reason unknown to either of the parties. In business critical applications, loss of connectivity often means the business ceases to function as it should with the resulting loss of revenue as a result.
  • Often at the application layer (for example a Java™ Application, Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc., in the United States, other countries, or both) the failure manifests itself as a very simplistic exception (e.g. an IOException in Java™) which effectively tells the application nothing more than “something has broken”. This can (and does) lead in extreme cases to each party blaming the other for the loss of connection, particularly if a service level agreement (SLA) of some kind is in place between the two.
  • Similarly, problem determination can be hard to focus, particularly if the connection is formed by a route over a number of hops, for example a LAN in a data centre, a public WAN such as the Internet, and so on. The embodiments described below help narrow the failure possibilities to help better identify the broken point in the connection.
  • SUMMARY
  • In order to address these issues, one method embodiment (which can be controlled and/or operated by a third party) herein detects a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over a communication path. The communication path is formed of a plurality of nodes of at least one computerized network.
  • Upon detection of the failed communication, the method initiates a first inquiry process from the sender. This first inquiry process tests how far a first test communication transmission can travel from the sender to the recipient along the communication path. Similarly, upon detection of the failed communication, the method initiates a second inquiry process from the recipient. The second inquiry process tests how far a second test communication transmission can travel from the recipient to the sender along the communication path. Thus, the first inquiry process and the second inquiry process send (potentially simultaneously) the test messages from opposite ends of the communication path.
  • In order to initiate such testing (the first inquiry process and the second inquiry process) the method sends instructions to the sender and the recipient over a second communication path that is different than the first communication path.
  • The method combines the results of the first inquiry process and the results of the second inquiry process to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node. The identification of the possibly faulty node is then output to the third party, the sender and/or the recipient.
  • This process of using the results of the first and second inquiry processes involves identifying at least one of the nodes positioned between a first farthest limit and a second farthest limit. The first farthest limit is the farthest location along the communication path from the sender where a first test communication transmission traveled. The second farthest limit is the farthest location along the communication path from the recipient where a second test communication transmission traveled as the possibly faulty node.
  • In some embodiments the results of the first and second inquiry processes can be sent to a third party that is different than the sender and the recipient. This third party would then perform the process of using the results to identify the possibly faulty node.
  • Simultaneous with the outputting of the identification of the possibly faulty node, the method can also output an identification of the failed communication transmission to the sender and the recipient. Therefore, the embodiments herein do not just report that a communication transmission has failed, but also simultaneously report the possibly faulty node or nodes that are likely responsible.
  • In addition, system embodiments are presented herein. One system embodiment comprises a monitor that can be positioned in the sender or the recipient (or positioned external to both) and that is operatively connected to the communication path.
  • The monitor detects the failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to the recipient over the communication path. Also, the monitor sends instructions to the first tester and the second tester over a second communication path (that is different than the first communication path) to initiate the first inquiry process and the second inquiry process. Again, the first inquiry process and the second inquiry process send test messages (test communication transmissions) from opposite ends of the communication path.
  • In addition, the system includes a first tester that is operatively connected to the monitor and is in communication with or positioned within the sender. The first tester initiates the first inquiry process from the sender upon the detection of the failed communication. Again, the first inquiry process tests how far the first test communication transmission can travel from the sender along the communication path.
  • Similarly, the system includes a second tester that is operatively connected to the monitor and is in communication with or positioned within the recipient. The second tester initiates the second inquiry process from the recipient upon the detection of the failed communication. Again, the second inquiry process tests how far the second test communication transmission can travel from the recipient along the communication path.
  • The system further includes a processor that is operatively connected to the first tester and the second tester. The processor can be within the first tester, the second tester or can be a third party separate from both. The first and second testers respectively output the results of the first and second inquiry processes to the processor.
  • Then, the processor combines the results of the first and second inquiry processes to determine which of the nodes in the communication path are not successfully forwarding test communications so as to identify the one or more possibly faulty nodes. The processor combines the results by identifying the node or nodes positioned between the first farthest limit along the communication path from the sender where the first test communication transmission traveled and the second farthest limit along the communication path from the recipient where the second test communication transmission traveled as the possibly faulty node.
  • The processor outputs the identification of the possibly faulty node (potentially from the third party) to the sender and the recipient. In some embodiments the processor can output, simultaneous with the outputting of the identification of the possibly faulty node, an identification of the failed communication transmission to the sender and the recipient.
  • These and other aspects of the embodiments of the invention will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating embodiments of the invention and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments of the invention without departing from the spirit thereof, and the embodiments of the invention include all such modifications.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The embodiments of the invention will be better understood from the following detailed description with reference to the drawings, in which:
  • FIG. 1 is a flow diagram illustrating a method embodiment of the invention;
  • FIG. 2 is a schematic diagram of a communication network embodiment of the invention; and
  • FIG. 3 is a schematic diagram of a system embodiment of the invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • The embodiments of the invention and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. It should be noted that the features illustrated in the drawings are not necessarily drawn to scale. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments of the invention. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments of the invention may be practiced and to further enable those of skill in the art to practice the embodiments of the invention. Accordingly, the examples should not be construed as limiting the scope of the embodiments of the invention.
  • As mentioned above, conventional systems can report communication failures, without identifying the cause. To address such issues, embodiments herein search for failures from both the sender side and the recipient side. Further, embodiments herein identify possible failed nodes before reporting the communications failure so that both the failure and the possible source of the failure can be reported together.
  • Thus, on discovery of a network breakage, instead of raising an exception immediately to the application, the embodiments herein (e.g., using a Socket on Java™) issue a diagnostic call (e.g. to Ping®, Traceroute®, Pathchar®, and Tulip® or similar applications, discussed below) to determine how far down the given route between the two points a party is able to connect. Traceroute®, for example, is able to show the route between two points and establish connections with each hop, returning a code to indicate success (or otherwise, with a reason) upon reaching that hop.
  • As shown in flowchart form in FIG. 1, one embodiment herein begins by detecting a failed communication transmission in item 100. All the steps herein can be controlled, operated, and/or performed by a third party that is separate from the sender and the recipient. For example, the third party can own and/or control software used by the sender and recipient to perform the process described below such that, in effect, the third party is performing all the steps of the method described below. More specifically, a failed communication transmission can occur when a recipient does not receive an expected or requested item after a specific time period has timed-out, or when a sender does not receive a confirmation that a sent item has been received by the recipient after a specific time period has timed-out.
  • Upon detection of the failed communication, the method initiates a first inquiry process from the sender in item 102. This first inquiry process 102 tests how far a first test communication transmission can travel from the sender to the recipient along the communication path. Similarly, upon detection of the failed communication, the method initiates a second inquiry process from the recipient in item 104. The second inquiry process 104 tests how far a second test communication transmission can travel from the recipient to the sender along the communication path. Thus, the first inquiry process 102 and the second inquiry process 104 send (potentially simultaneously) the test messages from opposite ends of the communication path.
  • The method combines the results of the first inquiry process 102 and the results of the second inquiry process 104 in item 106 to determine which of the nodes in the communication path are not successfully forwarding test communications to identify at least one possibly faulty node, shown as item 108. The identification of the possibly faulty node is then output to the sender and the recipient in item 110.
  • Simultaneous with the outputting of the identification of the possibly faulty node in item 110, the method can also output an identification of the failed communication transmission to the sender 200 and the recipient 202. Therefore, the embodiments herein do not just report that a communication transmission has failed, but also simultaneously report the possibly faulty node or nodes that are likely responsible.
  • An exemplary communication system is shown in FIGS. 2 and 3. This system includes a sender 200, a recipient 202, and a computerized communications network of nodes 204-214 between the sender 200 and recipient 202. The “failed communication transmission” that is detected in item 100 is one that fails to reach the recipient 202 after attempting to be transmitted from the sender 200 to the recipient 202 over a specific communication path, such as nodes 204, 206, 211, and 214.
  • In order to initiate such testing (the first inquiry process 102 and the second inquiry process 104) the method sends instructions to the sender 200 and the recipient 202 over a second communication path (e.g., 204, 205, 210, and 213) that is different than the first communication path (204, 206, 211, and 214). One ordinarily skilled in the art would understand that these paths are only examples and any path could be the primary path and the secondary path.
  • A monitor 230 can be positioned in the sender 200 or the recipient 202 (or positioned external to both) and is operatively connected to the communication path. As shown in FIG. 2, there can be multiple monitors 230, or there can be just a single monitor 230. In addition, the sender 200 can include a first tester 232 and the recipient 202 can include a second tester 234.
  • The first tester 232 is operatively connected to the monitor 230 and is in communication with or positioned within the sender 200. Similarly, the second tester 234 is operatively connected to the monitor 230 and is in communication with or positioned within the recipient 202.
  • The monitor 230 detects the failed communication transmission that fails to reach the recipient 202 after attempting to be transmitted from the sender 200 to the recipient 202 over the communication path. As mentioned above, the monitor 230 sends instructions to the first tester 232 and the second tester 234 over the second communication path (e.g., 204, 205, 210, and 213) that is different than the first communication path (e.g., 204, 206, 211, and 214) to initiate the first inquiry process 102 and the second inquiry process 104. The first inquiry process 102 and the second inquiry process 104 respectively use the first tester 232 and the second tester 234 to send the test messages from opposite ends of the first communication path.
  • Thus, the first tester 232 initiates the first inquiry process 102 from the sender 200 upon the detection of the failed communication from the monitor 230. Again, the first inquiry 102 process tests how far the first test communication transmission can travel from the sender 200 to the recipient 202 along the first communication path (e.g., 204, 206, 211, and 214). The second tester 234 initiates the second inquiry process from the recipient 202 upon the detection of the failed communication from the monitor 230. Again, the second inquiry process tests how far the second test communication transmission can travel from the recipient 202 to the sender 200 along the first communication path.
  • The system further includes a processor that is operatively connected to the first tester 232 and the second tester 234. For example, FIG. 3 illustrates an exemplary system that could be included within the sender 200, the recipient 202, the monitor 230, the third party 220, any of the nodes 204-214, etc. The system in FIG. 3 comprises a hardware configuration of an information handling/computer system in accordance with the embodiments of the invention.
  • The system shown in FIG. 3 comprises at least one processor or central processing unit (CPU) 10. The CPUs 10 are interconnected via system bus 12 to various devices such as a random access memory (RAM) 14, read-only memory (ROM) 16, and an input/output (I/O) adapter 18. The I/O adapter 18 can connect to peripheral devices, such as disk units 11 and tape drives 13, or other program storage devices (computer readable media) that are readable by the system. The processors 10 can read the inventive instructions on the program storage devices 11, 13 and follow these instructions to execute the methodology of the embodiments of the invention, such as those shown in FIG. 1.
  • The system shown in FIG. 3 further includes a user interface adapter 19 that connects a keyboard 15, mouse 17, speaker 24, microphone 22, and/or other user interface devices such as a touch screen device (not shown) to the bus 12 to gather user input. Additionally, a communication adapter 20 connects the bus 12 to a data processing network 25, and a display adapter 21 connects the bus 12 to a display device 23 which may be embodied as an output device such as a monitor, printer, or transmitter, for example.
  • The process of using the results of the first and second inquiry processes in item 106 involves identifying at least one of the nodes 204-214 positioned between a first farthest limit and a second farthest limit. The first farthest limit is the farthest location along the first communication path from the sender 200 where the first test communication transmission traveled. The second farthest limit is the farthest location along the first communication path from the recipient 202 where the second test communication transmission traveled as the possibly faulty node. For example, if the first communication path were nodes 204, 206, 211, and 214, and if the first inquiry process 102 was only able to get a test communication to travel from the sender 200 to node 204, the first farthest limit would be node 204. Similarly, if the second inquiry process 104 was only able to get a test communication to travel from the recipient 202 to node 211, the second farthest limit would be node 211. This would identify node 206 (in path 204, 206, 211, and 214) as the possibly faulty node, because node 206 is between the first farthest limit 204 and the second farthest limit 211. Similarly, both could reach node 204, indicating that node 204 was the possibly faulty node.
  • In some embodiments the results of the first and second inquiry processes can be sent to a third party 220 that is different than the sender 200 and the recipient 202. This third party 220 would then perform the process of using the results to identify the possibly faulty node.
  • As mentioned above, the processor 10 can be within the first tester 232, the second tester 234, the third party 220, etc. The first and second testers 232, 234, respectively output the results of the first and second inquiry processes to the processor 10. Then, the processor 10 combines the results of the first and second inquiry processes to determine which of the nodes in the communication path are not successfully forwarding test communications so as to identify the one or more possibly faulty nodes. The processor 10 combines the results by identifying the node or nodes positioned between the first farthest limit along the communication path from the sender 200 where the first test communication transmission traveled and the second farthest limit along the communication path from the recipient 202 where the second test communication transmission traveled as the possibly faulty node. As mentioned above, if the first communication path were nodes 204, 206, 211, and 214, and if the first inquiry process 102 was only able to get a test communication to travel from the sender 200 to node 204, the first farthest limit would be node 204. Similarly, if the second inquiry process 104 was only able to get a test communication to travel from the recipient 202 to node 211, the second farthest limit would be node 211. This would identify node 206 (in path 204, 206, 211, and 214) as the possibly faulty node, because node 206 is between the first farthest limit 204 and the second farthest limit 211.
  • The processor 10 outputs the identification of the possibly faulty node to the sender 200 and the recipient 202. In some embodiments the processor 10 can output, simultaneous with the outputting of the identification of the possibly faulty node, an identification of the failed communication transmission to the sender 200 and the recipient 202.
  • The testers 232, 234 can use any systems that are appropriate for a given network. Such systems are well-known to those ordinarily skilled in the art and are not discussed in detail herein. For example, U.S. Patent Publication 2008/0049634 (the complete disclosure of which is incorporated herein by reference) uses Traceroute® to analyze real-time data transmissions across a network. Similarly, in U.S. Patent Publication 2007/0177524 (the complete disclosure of which is incorporated herein by reference) based on analysis of TCP path information and/or send/receive packet counts, loss of certain network connectivity can be inferred. Further, U.S. Patent Publication 2006/0203739 (the complete disclosure of which is incorporated herein by reference) mentions that tools users employ to investigate network problems include Ping®, Traceroute®, Pathchar®, and Tulip®, discussed below, and that such tools typically trace the paths taken by packets to a destination.
  • Ping® (Packet Internet Grouper) is a computer network tool used to test whether a particular host is reachable across an IP network and was written by Mike Muuss in December, 1983 and is currently available at ftp.arl.army.mil/pub/ping.shar. Traceroute® was written by Van Jacobson in 1987 from a suggestion by Steve Deering, with suggestions or fixes from C. Philip Wood, Tim Seaver and Ken Adelman and is currently available at ftp://ftp.ee.lbl.gov/traceroute.tar.gz. Pathchar® is a tool written by Van Jacobson of LBL's Network Research Group and is available at ftp://ftp.ee.lbl.gov/pathchar. Tulip® is a Java™ application developed by the MAGGIE-NS team from the National University of Sciences and Technology (NUST) Institute of Information Technology (NIIT) and the Stanford Linear Accelerator Center (SLAC) Internet End-to-end Performance Monitoring (IEPM) project in Palo Alto, Calif., USA and information on Tulip® can be found at www.slac.stanford.edu/comp/net/wan-mon/tulip/.
  • One exemplary implementation of the embodiments herein could use Traceroute® according to the following pseudocode:
  • if (networkError(endpoint)) { // if a network error occurs when trying
    to communicate with point ‘endpoint’
     String[ ] traceResult = traceroute(endpoint); // call traceroute,
    which will record hops between this starting point and ‘endpoint’. Record
    the results in array traceResult
     for (int i=0; i < traceResult.length; i++) { // for each item in our array
      System.err.println(traceResult[i]); // print it out
      if (traceResult[i].containsString(“Failure”)) { // if it is the first
      failure found then
        System.err.println(“Error occurred at point ”+i+“: ”
        +traceResult[i]) // print out the info break; // exit the loop
      }
     }
    }
  • Thus, as shown above, with embodiments herein, both ends of the connection perform testing when the network problem is spotted. By examining this routing information for each end of the connections, the point of probable failure can be narrowed when the two route reports are compared side by side. In more complex embodiments, both affected sites can transmit their information to the third party, to allow an automated determination of the point of failure.
  • The user is thus notified as to where the failure occurs. Comparison with the same information gathered at point ‘endpoint’ can be automatic or manual. The above code could be modified to update a log file with this information, as well as the time and date of recording.
  • Therefore, embodiments herein search for failures from both the sender side and the recipient side. Further, embodiments herein identify possible failed nodes before reporting the communications failure so that both the failure and the possible source of the failure can be reported together.
  • The foregoing description of the specific embodiments will so fully reveal the general nature of the invention that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments of the invention have been described in terms of embodiments, those skilled in the art will recognize that the embodiments of the invention can be practiced with modification within the spirit and scope of the appended claims.

Claims (20)

1. A method comprising:
detecting a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to said recipient over a communication path comprising a plurality of nodes of at least one computerized network;
initiating a first inquiry process from said sender upon detection of said failed communication, said first inquiry process comprising testing how far a first test communication transmission can travel from said sender to said recipient along said communication path;
initiating a second inquiry process from said recipient upon said detection of said failed communication, said second inquiry process comprising testing how far a second test communication transmission can travel from said recipient to said sender along said communication path;
using results of said first inquiry process and said second inquiry process to determine which of said nodes in said communication path are not successfully forwarding test communications to identify at least one possibly faulty node; and
outputting an identification of said possibly faulty node.
2. The method according to claim 1, further comprising sending instructions between said sender and said recipient over a second communication path different than said first communication path to initiate said inquiry process and said second inquiry process.
3. The method according to claim 1, said first inquiry process and said second inquiry processes sending said test messages from opposite ends of said communication path.
4. The method according to claim 1, further comprising, simultaneous with said outputting of said identification of said possibly faulty node, outputting an identification of said failed communication transmission.
5. The method according to claim 1, said using of said results comprising identifying at least one of said nodes positioned between a first farthest limit along said communication path from said sender where said first test communication transmission traveled and a second farthest limit along said communication path from said recipient where said second test communication transmission traveled as said possibly faulty node.
6. A method comprising:
detecting a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to said recipient over a communication path comprising a plurality of nodes of at least one computerized network;
initiating a first inquiry process from said sender upon detection of said failed communication, said first inquiry process comprising testing how far a first test communication transmission can travel from said sender to said recipient along said communication path;
outputting results of said first inquiry process to a third party, said third party being different than said sender and said recipient;
initiating a second inquiry process from said recipient upon said detection of said failed communication, said second inquiry process comprising testing how far a second test communication transmission can travel from said recipient to said sender along said communication path;
outputting results of said second inquiry process to said third party;
using, by said third party, said results of said first inquiry process and said results of said second inquiry process to determine which of said nodes in said communication path are not successfully forwarding test communications to identify at least one possibly faulty node; and
outputting an identification of said possibly faulty node from said third party.
7. The method according to claim 6, further comprising sending instructions between said sender and said recipient over a second communication path different than said communication path to initiate said first inquiry process and said second inquiry process.
8. The method according to claim 6, said first inquiry process and said second inquiry processes sending said test messages from opposite ends of said communication path.
9. The method according to claim 6, further comprising, simultaneous with said outputting of said identification of said possibly faulty node, outputting an identification of said failed communication transmission.
10. The method according to claim 6, said using of said results comprising identifying at least one of said nodes positioned between a first farthest limit along said communication path from said sender where said first test communication transmission traveled and a second farthest limit along said communication path from said recipient where said second test communication transmission traveled as said possibly faulty node.
11. A system comprising:
a monitor operatively connected to a communication path, said communication path comprising a plurality of nodes of at least one computerized network, said monitor detecting a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to said recipient over said communication path;
a first tester operatively connected to said monitor, said first tester initiating a first inquiry process from said sender upon detection of said failed communication, said first inquiry process comprising testing how far a first test communication transmission can travel from said sender to said recipient along said communication path;
a second tester operatively connected to said monitor, said second tester initiating a second inquiry process from said recipient upon said detection of said failed communication, said second inquiry process comprising testing how far a second test communication transmission can travel from said recipient to said sender along said communication path; and
a processor operatively connected to said first tester and said second tester, said first tester outputting results of said first inquiry process to said processor and said second tester outputting results of said second inquiry process to said processor,
said processor using said results of said first inquiry process and said results of said second inquiry process to determine which of said nodes in said communication path are not successfully forwarding test communications to identify at least one possibly faulty node, and
said processor outputting an identification of said possibly faulty node.
12. The system according to claim 11, said monitor sending instructions to said first tester and said second tester over a second communication path different than said communication path to initiate said first inquiry process and said second inquiry process.
13. The system according to claim 11, said first inquiry process and said second inquiry processes sending said test messages from opposite ends of said communication path.
14. The system according to claim 11, said processor outputting, simultaneous with said outputting of said identification of said possibly faulty node, an identification of said failed communication transmission.
15. The system according to claim 11, said processor using said results by identifying at least one of said nodes positioned between a first farthest limit along said communication path from said sender where said first test communication transmission traveled and a second farthest limit along said communication path from said recipient where said second test communication transmission traveled as said possibly faulty node.
16. A program storage device comprising a computer storage medium storing instructions executable by a computer to perform a method comprising:
detecting a failed communication transmission that fails to reach a recipient after attempting to be transmitted from a sender to said recipient over a communication path comprising a plurality of nodes of at least one computerized network;
initiating a first inquiry process from said sender upon detection of said failed communication, said first inquiry process comprising testing how far a first test communication transmission can travel from said sender to said recipient along said communication path;
initiating a second inquiry process from said recipient upon said detection of said failed communication, said second inquiry process comprising testing how far a second test communication transmission can travel from said recipient to said sender along said communication path;
using results of said first inquiry process and said second inquiry process to determine which of said nodes in said communication path are not successfully forwarding test communications to identify at least one possibly faulty node; and
outputting an identification of said possibly faulty node.
17. The program storage device according to claim 16, further comprising sending instructions between said sender and said recipient over a second communication path different than said communication path to initiate said first inquiry process and said second inquiry process.
18. The program storage device according to claim 16, said first inquiry process and said second inquiry processes sending said test messages from opposite ends of said communication path.
19. The program storage device according to claim 16, further comprising, simultaneous with said outputting of said identification of said possibly faulty node, outputting an identification of said failed communication transmission.
20. The program storage device according to claim 16, said using of said results comprising identifying at least one of said nodes positioned between a first farthest limit along said communication path from said sender where said first test communication transmission traveled and a second farthest limit along said communication path from said recipient where said second test communication transmission traveled as said possibly faulty node.
US12/233,724 2008-09-19 2008-09-19 System and method for detecting a network failure Expired - Fee Related US7983175B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/233,724 US7983175B2 (en) 2008-09-19 2008-09-19 System and method for detecting a network failure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/233,724 US7983175B2 (en) 2008-09-19 2008-09-19 System and method for detecting a network failure

Publications (2)

Publication Number Publication Date
US20100074118A1 true US20100074118A1 (en) 2010-03-25
US7983175B2 US7983175B2 (en) 2011-07-19

Family

ID=42037580

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/233,724 Expired - Fee Related US7983175B2 (en) 2008-09-19 2008-09-19 System and method for detecting a network failure

Country Status (1)

Country Link
US (1) US7983175B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110085450A1 (en) * 2009-10-07 2011-04-14 Vinod Jeyachandran Network path discovery and analysis
US20140379894A1 (en) * 2013-06-21 2014-12-25 Microsoft Corporation Using different connectivity checks to determine causes of connectivity issues

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8407521B2 (en) * 2009-01-09 2013-03-26 International Business Machines Corporation Dynamic testing of networks
US8724494B2 (en) 2009-10-07 2014-05-13 Riverbed Technology, Inc. Network multi-path discovery
US8769089B2 (en) 2011-11-15 2014-07-01 International Business Machines Corporation Distributed application using diagnostic heartbeating
US9244796B2 (en) 2011-11-15 2016-01-26 International Business Machines Corporation Diagnostic heartbeat throttling
US8903893B2 (en) 2011-11-15 2014-12-02 International Business Machines Corporation Diagnostic heartbeating in a distributed data processing environment
US8874974B2 (en) * 2011-11-15 2014-10-28 International Business Machines Corporation Synchronizing a distributed communication system using diagnostic heartbeating
US8756453B2 (en) 2011-11-15 2014-06-17 International Business Machines Corporation Communication system with diagnostic capabilities
US9369360B1 (en) * 2014-05-12 2016-06-14 Google Inc. Systems and methods for fault detection in large scale networks
US9712381B1 (en) 2014-07-31 2017-07-18 Google Inc. Systems and methods for targeted probing to pinpoint failures in large scale networks
CN108881295A (en) * 2018-07-24 2018-11-23 瑞典爱立信有限公司 For detecting and solving the method and the network equipment of anomalous routes

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4980857A (en) * 1987-04-15 1990-12-25 Allied-Signal Inc. Operations controller for a fault tolerant multiple node processing system
US5051996A (en) * 1989-03-27 1991-09-24 The United States Of America As Represented By The United States Department Of Energy Built-in-test by signature inspection (bitsi)
US6494831B1 (en) * 1999-09-03 2002-12-17 Ge Medical Technology Services, Inc. Medical diagnostic system service connectivity method and apparatus
US20030117961A1 (en) * 2001-12-26 2003-06-26 Chuah John Tiong-Heng Method and system for isolation of a fault location in a communications device
US6894980B1 (en) * 2000-05-05 2005-05-17 Qwest Communication International Inc. Automated method and system for verifying end-to-end connectivity in a broadband network
US6959403B2 (en) * 1999-12-14 2005-10-25 Honeywell International Inc. Fault localization and health indication for a controller area network
US7284147B2 (en) * 2003-08-27 2007-10-16 International Business Machines Corporation Reliable fault resolution in a cluster

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7047459B2 (en) 2001-12-26 2006-05-16 Alcated Canada Inc. Method and system for isolation of a fault location in a communications network
US7512841B2 (en) 2004-10-22 2009-03-31 Hewlett-Packard Development Company, L.P. Method and system for network fault analysis
US20060203739A1 (en) 2005-03-14 2006-09-14 Microsoft Corporation Profiling wide-area networks using peer cooperation
US8730814B2 (en) 2005-05-25 2014-05-20 Alcatel Lucent Communication network connection failure protection methods and systems
JP4704120B2 (en) 2005-06-13 2011-06-15 富士通株式会社 Network failure detection apparatus and network failure detection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4980857A (en) * 1987-04-15 1990-12-25 Allied-Signal Inc. Operations controller for a fault tolerant multiple node processing system
US5051996A (en) * 1989-03-27 1991-09-24 The United States Of America As Represented By The United States Department Of Energy Built-in-test by signature inspection (bitsi)
US6494831B1 (en) * 1999-09-03 2002-12-17 Ge Medical Technology Services, Inc. Medical diagnostic system service connectivity method and apparatus
US6959403B2 (en) * 1999-12-14 2005-10-25 Honeywell International Inc. Fault localization and health indication for a controller area network
US6894980B1 (en) * 2000-05-05 2005-05-17 Qwest Communication International Inc. Automated method and system for verifying end-to-end connectivity in a broadband network
US20030117961A1 (en) * 2001-12-26 2003-06-26 Chuah John Tiong-Heng Method and system for isolation of a fault location in a communications device
US7284147B2 (en) * 2003-08-27 2007-10-16 International Business Machines Corporation Reliable fault resolution in a cluster

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110085450A1 (en) * 2009-10-07 2011-04-14 Vinod Jeyachandran Network path discovery and analysis
US20110085449A1 (en) * 2009-10-07 2011-04-14 Vinod Jeyachandran Network path discovery and analysis
US8811193B2 (en) 2009-10-07 2014-08-19 Riverbed Technology, Inc. Network path discovery and analysis
US9014012B2 (en) * 2009-10-07 2015-04-21 Riverbed Technology, Inc. Network path discovery and analysis
US20140379894A1 (en) * 2013-06-21 2014-12-25 Microsoft Corporation Using different connectivity checks to determine causes of connectivity issues
US9544207B2 (en) * 2013-06-21 2017-01-10 Microsoft Technology Licensing, Llc Using different connectivity checks to determine causes of connectivity issues

Also Published As

Publication number Publication date
US7983175B2 (en) 2011-07-19

Similar Documents

Publication Publication Date Title
US7983175B2 (en) System and method for detecting a network failure
US10103851B2 (en) Network link monitoring and testing
JP6988511B2 (en) Failure detection method, node device, communication system
US7995574B2 (en) Detection of forwarding problems for external prefixes
WO2021128977A1 (en) Fault diagnosis method and apparatus
US20050044443A1 (en) Detection of network misconfigurations
US9100300B2 (en) Mitigating network connection problems using supporting devices
CN107517119B (en) Virtual network detection method and device in VPC environment
US9825855B2 (en) Information processing apparatus and route setting method
CN104796298A (en) SDN (Software Defined Network) network fault analyzing method and device
JP2008519493A (en) Remote estimation of round trip delay in data networks
US9083615B2 (en) Diagnosing network problems in an IPV6 dual stack network
CN104270282B (en) A kind of IP network end-to-end test method and apparatus
US20230239375A1 (en) Deriving proxy stability without network inspection
CN111934936A (en) Network state detection method and device, electronic equipment and storage medium
US20140003224A1 (en) Deterministic network failure detection
CN102143018A (en) Message loop detection method, routing agent equipment and networking system
US9509777B2 (en) Connection method and management server
CN109120449A (en) A kind of detection method and device of link failure
JP2010114657A (en) Communication path detection method, communication path detection program, and communication path detecting device
JP5367002B2 (en) Monitoring server and monitoring program
US20190273810A1 (en) Diffusing packets to identify faulty network apparatuses in multipath inter-data center networks
JP4411188B2 (en) Online system and communication method
US20220103420A1 (en) Network management method, network system, aggregated analysis apparatus, terminal apparatus and program
WO2017159520A1 (en) Network communication quality measurement system, network communication quality measurement method and recording medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GALE, MARTIN J.;OWENS, CLARE;JOHNSON, PETER;AND OTHERS;SIGNING DATES FROM 20080908 TO 20080916;REEL/FRAME:021555/0588

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GALE, MARTIN J.;OWENS, CLARE;JOHNSON, PETER;AND OTHERS;SIGNING DATES FROM 20080908 TO 20080916;REEL/FRAME:021555/0588

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20150719